Chapter 15. Perspectives, Resources and the Future

THE FOCUS OF THIS BOOK thus far has been to look at the tools, technologies, processes, and procedures you can use as a security professional to secure your organization's IT assets, networks, and systems. You've learned about using firewalls to secure the perimeter of the network and VPNs for securing data in transit. You've learned how malicious people might try to attack your network. An understanding of these topics and the others discussed here is critically important for success in the information security field. In this chapter you'll learn about what's next.

Today's information security professionals face a daunting task. Not only do you need to understand how to secure a complex, diverse, ...

The best content for your career. Discover unlimited learning
on demand for around $1/day.